CN102770869B - 计算资源的安全执行 - Google Patents

计算资源的安全执行 Download PDF

Info

Publication number
CN102770869B
CN102770869B CN201080064671.4A CN201080064671A CN102770869B CN 102770869 B CN102770869 B CN 102770869B CN 201080064671 A CN201080064671 A CN 201080064671A CN 102770869 B CN102770869 B CN 102770869B
Authority
CN
China
Prior art keywords
computational resource
descriptor
systems
secondary descriptor
token
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201080064671.4A
Other languages
English (en)
Chinese (zh)
Other versions
CN102770869A (zh
Inventor
B.拉森
R.A.沙皮罗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ab Initio Technology LLC
Original Assignee
Ab Initio Technology LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ab Initio Technology LLC filed Critical Ab Initio Technology LLC
Publication of CN102770869A publication Critical patent/CN102770869A/zh
Application granted granted Critical
Publication of CN102770869B publication Critical patent/CN102770869B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)
  • Advance Control (AREA)
CN201080064671.4A 2009-12-23 2010-12-21 计算资源的安全执行 Active CN102770869B (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US12/646,059 2009-12-23
US12/646,059 US8782429B2 (en) 2009-12-23 2009-12-23 Securing execution of computational resources
PCT/US2010/061517 WO2011079112A1 (en) 2009-12-23 2010-12-21 Securing execution of computational resources

Publications (2)

Publication Number Publication Date
CN102770869A CN102770869A (zh) 2012-11-07
CN102770869B true CN102770869B (zh) 2015-11-25

Family

ID=43736874

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201080064671.4A Active CN102770869B (zh) 2009-12-23 2010-12-21 计算资源的安全执行

Country Status (8)

Country Link
US (1) US8782429B2 (enExample)
EP (1) EP2517140B1 (enExample)
JP (1) JP5797666B2 (enExample)
KR (2) KR101643677B1 (enExample)
CN (1) CN102770869B (enExample)
AU (1) AU2010336503B2 (enExample)
CA (1) CA2784896C (enExample)
WO (1) WO2011079112A1 (enExample)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5988473B2 (ja) * 2011-09-20 2016-09-07 株式会社Dnpハイパーテック モジュールの暗号化/復号化プログラム
US9112851B2 (en) * 2013-06-18 2015-08-18 Sap Se Integrating web protocols with applications and services
US9237006B2 (en) * 2013-09-30 2016-01-12 Protegrity Corporation Table-connected tokenization
US10657262B1 (en) * 2014-09-28 2020-05-19 Red Balloon Security, Inc. Method and apparatus for securing embedded device firmware
EP3449451B8 (en) * 2016-04-29 2022-09-14 nChain Licensing AG Implementing logic gate functionality using a blockchain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1526429A2 (en) * 2003-10-24 2005-04-27 Microsoft Corporation Operating system resource protection
US20070186112A1 (en) * 2005-01-28 2007-08-09 Microsoft Corporation Controlling execution of computer applications
CN101110097A (zh) * 2007-08-17 2008-01-23 南京新模式软件集成有限公司 一种电子文件安全外发的方法
US20090094673A1 (en) * 2007-10-07 2009-04-09 Seguin Jean-Marc L Method and system for integrated securing and managing of virtual machines and virtual appliances

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5966072A (en) 1996-07-02 1999-10-12 Ab Initio Software Corporation Executing computations expressed as graphs
US6308274B1 (en) * 1998-06-12 2001-10-23 Microsoft Corporation Least privilege via restricted tokens
US7673323B1 (en) * 1998-10-28 2010-03-02 Bea Systems, Inc. System and method for maintaining security in a distributed computer network
US6874088B1 (en) * 1999-10-22 2005-03-29 Mission Critical Linux, Llc Secure remote servicing of a computer system over a computer network
JP4447977B2 (ja) * 2004-06-30 2010-04-07 富士通マイクロエレクトロニクス株式会社 セキュアプロセッサ、およびセキュアプロセッサ用プログラム。
JP4718151B2 (ja) * 2004-09-24 2011-07-06 三菱電機株式会社 情報処理装置、情報処理方法およびプログラム
US7716630B2 (en) 2005-06-27 2010-05-11 Ab Initio Technology Llc Managing parameters for graph-based computations
US8006088B2 (en) * 2005-08-18 2011-08-23 Beyondtrust Corporation Methods and systems for network-based management of application security
US8407704B2 (en) * 2006-09-26 2013-03-26 International Business Machines Corporation Multi-level memory architecture using data structures for storing access rights and performing address translation
US8370957B2 (en) 2006-12-05 2013-02-05 Samsung Electronics Co., Ltd Method and apparatus for transmitting contents with limited system permissions
JP5112924B2 (ja) * 2008-03-27 2013-01-09 株式会社Kddiテクノロジー アプリケーション移動システム、アプリケーションの移動方法、プログラムおよび携帯端末

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1526429A2 (en) * 2003-10-24 2005-04-27 Microsoft Corporation Operating system resource protection
US20070186112A1 (en) * 2005-01-28 2007-08-09 Microsoft Corporation Controlling execution of computer applications
CN101110097A (zh) * 2007-08-17 2008-01-23 南京新模式软件集成有限公司 一种电子文件安全外发的方法
US20090094673A1 (en) * 2007-10-07 2009-04-09 Seguin Jean-Marc L Method and system for integrated securing and managing of virtual machines and virtual appliances

Also Published As

Publication number Publication date
AU2010336503B2 (en) 2015-01-15
US20110154051A1 (en) 2011-06-23
AU2010336503A1 (en) 2012-06-14
CA2784896C (en) 2017-06-20
EP2517140A1 (en) 2012-10-31
EP2517140B1 (en) 2019-08-14
CN102770869A (zh) 2012-11-07
CA2784896A1 (en) 2011-06-30
JP2013516004A (ja) 2013-05-09
KR101751316B1 (ko) 2017-06-27
JP5797666B2 (ja) 2015-10-21
KR20120104271A (ko) 2012-09-20
US8782429B2 (en) 2014-07-15
KR101643677B1 (ko) 2016-08-10
WO2011079112A4 (en) 2011-08-18
KR20150042298A (ko) 2015-04-20
WO2011079112A1 (en) 2011-06-30

Similar Documents

Publication Publication Date Title
US7356692B2 (en) Method and system for enforcing access to a computing resource using a licensing attribute certificate
CN105408912B (zh) 处理认证和资源许可
US9898587B2 (en) Software protection using an installation product having an entitlement file
Abdunabi et al. Specification, validation, and enforcement of a generalized spatio-temporal role-based access control model
JPH10313309A (ja) 国際暗号法フレームワークでアプリケーションが一定のサービスクラスを合法的に実行することを認証する装置
KR20230046291A (ko) 연맹 권한 및 계층적 키 관리를 위한 방법, 장치 및 컴퓨터 판독 가능 매체
KR20200099041A (ko) 블록체인 기반 콘텐츠 이용 권한 관리 장치 및 방법
CN102770869B (zh) 计算资源的安全执行
Nyman et al. Citizen electronic identities using TPM 2.0
Parno Trust extension as a mechanism for secure code execution on commodity computers
Park et al. CAFE: A virtualization-based approach to protecting sensitive cloud application logic confidentiality
CN119483978B (zh) 基于可信执行环境的隐私增强方法、装置、设备及介质
Nwosu Decentralised Telehealth Data through Blockchain Technology: A ledger between physical and online health services
HK1172112A (en) Securing execution of computational resources
HK1172112B (en) Securing execution of computational resources
Wagner Trustworthy Distributed Usage Control Enforcement in Heterogeneous Trusted Computing Environments
Song et al. Securing HDF5 Plugins with Digital Signatures
Miriyala et al. Comparative Review of AWS and Azure Confidential Computing Systems
Jiao On the Security of Blockchain-based Applications
WO2024256200A1 (en) Method for improving data security
Carey et al. Securing Genomic Computations for Research and Clinical Decision Support
CN119515546A (zh) 一种基于Web3框架的数字资产管控平台、设备及介质
HK40060449A (en) Personalized and cryptographically secure access control in operating systems
HK40060449B (en) Personalized and cryptographically secure access control in operating systems
Wagner Trustworthy Distributed Usage Control Enforcement in Heterogeneous Trusted Computing Environments

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant